aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2005-08-28 02:17:24 +0800
committersimon <simon@FreeBSD.org>2005-08-28 02:17:24 +0800
commit50cb2c692d970899c8a46e699920a5f1a6629e4b (patch)
tree9e8cef717199e9fef384719d7b74996c3e26f42d /security/vuxml
parent3b09744514c72ea3595745498d3dce7c76569058 (diff)
downloadfreebsd-ports-gnome-50cb2c692d970899c8a46e699920a5f1a6629e4b.tar.gz
freebsd-ports-gnome-50cb2c692d970899c8a46e699920a5f1a6629e4b.tar.zst
freebsd-ports-gnome-50cb2c692d970899c8a46e699920a5f1a6629e4b.zip
Mark phpgroupware as vulnerable to pear-XML_RPC -- remote PHP code
injection vulnerability. Reported by: olgeni Approved by: portmgr (blanket, VuXML)
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml7
1 files changed, 6 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 96fb5e3f4ca4..0006b80eb071 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -314,6 +314,10 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<name>phpAdsNew</name>
<range><lt>2.0.5</lt></range>
</package>
+ <package>
+ <name>phpgroupware</name>
+ <range><lt>0.9.16.007</lt></range>
+ </package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
@@ -338,6 +342,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
</description>
<references>
<cvename>CAN-2005-2498</cvename>
+ <url>http://downloads.phpgroupware.org/changelog</url>
<url>http://drupal.org/files/sa-2005-004/advisory.txt</url>
<url>http://phpadsnew.com/two/nucleus/index.php?itemid=45</url>
<url>http://sourceforge.net/project/shownotes.php?release_id=349626</url>
@@ -348,7 +353,7 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<dates>
<discovery>2005-08-15</discovery>
<entry>2005-08-15</entry>
- <modified>2005-08-17</modified>
+ <modified>2005-08-27</modified>
</dates>
</vuln>